US20040194083A1 - Program installation process - Google Patents
Program installation process Download PDFInfo
- Publication number
- US20040194083A1 US20040194083A1 US10/481,590 US48159003A US2004194083A1 US 20040194083 A1 US20040194083 A1 US 20040194083A1 US 48159003 A US48159003 A US 48159003A US 2004194083 A1 US2004194083 A1 US 2004194083A1
- Authority
- US
- United States
- Prior art keywords
- terminal
- server
- software
- installation
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000009434 installation Methods 0.000 claims abstract description 15
- 238000000034 method Methods 0.000 claims description 24
- 238000004891 communication Methods 0.000 claims description 7
- 230000005540 biological transmission Effects 0.000 claims description 4
- 238000011900 installation process Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 238000010200 validation analysis Methods 0.000 description 5
- 239000000969 carrier Substances 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
Definitions
- This invention relates to the installation of operating software to personal computers and other consumer equipment, such as the software required for the computer to operate with newly installed hardware.
- Such hardware is typically embodied as a set of electronic components and the necessary connections for fitting to a computer, either to provide a new capability or to upgrade an existing one.
- a reconfiguration procedure has to be carried out to ensure that the computer recognises the presence and purpose of the new hardware. Similar reconfiguration may be necessary if the computer is to be connected through a new communications system, or to carry out new processes in co-operation with other remote apparatus. These re-configurations do not necessarily involve the installation of new hardware.
- the reconfiguration can be an intensive process requiring a considerable amount of technical knowledge by the user, and the details of the process vary from one machine to another depending both on its original design and any previous reconfigurations which may have been made. Information may also be required about various network servers to which the computer is connected in order to correctly configure the computer. It is therefore difficult for a supplier to provide simple instructions suitable for a lay person to perform the process. Some systems provide step-by-step instructions for the user to perform as the installation proceeds, but nevertheless require the user to provide input of several pieces of information he may not readily have to hand.
- the present invention allows the process to be automated, requiring only a single “run” instruction from the user. It also ensures that when a user subsequently uses the downloaded software, the user is an authorised user of that software and is not using an unauthorised copy.
- the invention will be described, for illustrative purposes, in relation to an embodiment for the configuration of a computer to communicate over a suitable telecommunications system using an Internet Security Protocol (IPSec) client, or over a Wireless LAN (local area network).
- IPSec Internet Security Protocol
- Wireless LAN local area network
- This certification code prevents the use of unauthorised copies of the downloaded software since such copies, downloaded from an authorised terminal, would not obtain a correct code from the server.
- the generic software may perform any desrired function.
- it comprises communications interface software.
- the server may be arranged to allow access to the installation software only from specified users, for example by use of a firewall system or a password control system.
- the password may be a product key associated with a data carrier carrying the generic software components, the server permitting only a limited number of accessions (typically just one) by users using any one product key.
- the invention also extends to a data carrier for carrying the generic software components used in this method.
- a data carrier for carrying the generic software components used in this method.
- the computer program product may be embodied on any suitable carrier readable by a suitable computer input device, and may take the form of optically readable marks, magnetic media, punched card or tape, or an electromagnetic (radio frequency or optical) or ultrasonic signal.
- the carrier may carry programming for several services, accessible by different users or user groups.
- the invention also extends to a general-purpose computer programmed to operate as a server and having means for receiving details of a terminal's operating system, means for generating specific information according to the terminal's operating system for installation of operating software on the terminal's operating system, a database for storing user identities, means for generating a certification code for transmission to a terminal during the installation process, and means for verification of a terminal identity transmitted to the computer by a terminal's operating system.
- it has means for identifying, by interrogation of a terminal, the specific configuration of that terminal and for providing the installation software necessary for that configuration. It may also have access control means to allow access to the installation software only from specified users.
- the server may be a privately operated server, for example run by a business for use by its employees, using a “firewall” system to allow access only from those employees' terminals.
- it may be an external website, with controls in place such as password control to control access to the installation software.
- the installation software can be available to anyone granted access rights—the program provider may grant access rights through one or more corporate internets (“intranets”), or to individuals.
- the server has means for identifying, by interrogation of the client computer, the specific configuration of the client computer and provide the necessary installation software. This removes the need for the human user to provide any input.
- the generic software comprises communications interface software such as client software and Wireless LAN drivers
- the verification of a user identity carried in the operating software ensures that the carrier on which the program is carried (typically a CD-ROM having a unique identity code) has not been previously used by another user and therefore has not been cloned, and verifies the user as legitimate.
- the carrier on which the program is carried typically a CD-ROM having a unique identity code
- the invention may be embodied in any suitable computer language, and capable of operation with any operating system supported by standard computers.
- the invention allows a single-click process, requiring no configuration input from the user, to be used to automatically install and configure systems such as WLAN drivers and security technology. No other information is required from the user as a web-site hosted by the security body provides the specific configuration information required for the user's needs. This web-site is accessed automatically as part of the process. No network specific inputs are required from the user, therefore the data carrier carrying the programming that initiates the process can be generic for multiple, different deployments.
- a validation database may be provided to enable the organisation providing the service to restrict the user base. In advance the company can determine exactly who can access the service—for example a wireless local area network (WLAN)—and can easily amend or revoke privileges.
- Installation data carriers typically CD-ROMs can be provided from any location without need for training, and specifics of installation are performed via a web-site configured for the company.
- FIGURE is a schematic representation of the various elements which co-operate to perform the invention (indicated by reference numerals beginning with a “1”), incorporating representations of information transfers illustrating the operation of the invention (indicated by reference numerals beginning with a “2”).
- FIGURE shows a personal computer 10 connected by way of a network 11 to a server 12 having access to a validation database 13 , and a security management system 14 .
- a data carrier 15 such as a compact disc read-only memory (CDROM), is used to carry the required programming.
- CDROM compact disc read-only memory
- the CDROM is used in this embodiment purely for illustrative purposes; the carrier 15 may take any suitable form, such as a signal carried over a suitable transmission medium such as the network 11 .
- the user terminal 10 is a user's laptop or desktop computer.
- the client software and wireless hardware are installed onto this device allowing the user to communicate securely over the wireless link 11 .
- the server may be a privately operated server serving a limited number of user terminals ( 10 etc) to which the installation software must first be supplied when the operator of the server wishes its client servers to have the software installed.
- the server 12 may be accessed as a website operated by the creator of the software and having the installation software made available to any authorised user.
- the server 12 is used during the install process to ascertain the user's operating system requirements and then downloads the specific configuration information according to the user's needs. This downloaded information is then used to complete the install process.
- the validation database 13 allows the provider of the service to specify the identities of users who are entitled to use the service enabled by the program on the data carrier 10 .
- the carrier may carry programming for several services, accessible by different users or user groups.
- the server 12 is also used to access the validation database 13 to allow users to register a product key code (provided with the installation CDROM) to download an encrypted Secure Internet Protocol Configuration file.
- This configuration file is decrypted by a set-up program, and the parameters are used to launch the Secure Internet Protocol set-up program.
- the Security Management System 14 provides network security and administration, issues certificates as a public key encrypted document to each authorised user who installs the system.
- these certificates can be used to verify the authenticity of the user.
- a list of every client is stored on the Security management system 14 , giving such information as the time and date that the secure certificate was issued, and the last time the certificate was revised or renewed.
- the operator of the server first has to receive from the supplier a server application program, for example on a CD-ROM, for installation on the server 12 . It also receives a batch of Client CDs, for distibution to its employees or other users who are to use the installation service. With this batch is provided a list of product key codes stored in encrypted format. This list can be supplied in any suitable form, preferably electronic, such as e-mail or floppy disc.
- the product key code is printed on the packaging of each client CDROM, or in other accompanying literature, each corresponding to one of the codes entered in the validation database 13 (step 20 ).
- a user receives the installation CDROM 15 , he installs the CDROM on his user terminal 10 .
- the installation program on the CDROM causes the terminal 10 to access the appropriate server 12 , either directly if connected by a local area network, or otherwise via a suitable website, to attempt registration (step 21 ).
- the server 12 initiates a user interface dialog and returns a request for the product key code which the user then supplies (step 22 ).
- the set up process runs on the user terminal 10 as follows.
- the user terminal first accesses the server 12 (step 22 ) for the configuration file previously installed there.
- This configuration process first verifies the product key previously entered by the user. If this is validated the server 12 sends the configuration file to the client terminal 10 .
- the Wireless LAN card driver is installed (step 23 ). This will cause the computer to reboot its operating system (e.g. Microsoft WindowsTM NT or 2000) so that operating system will recognise the new driver, but the installation process may continue automatically whilst this is going on.
- the installation program accesses the server 12 (step 24 ), which queries the database 13 (step 25 ) to ensure that the user is permitted to use the system.
- the checks carried out may include identification of the terminal 10 itself, or of the telecommunications line 11 by which the terminal 10 accessed the system.
- the server 12 also verifies that the product key that was entered exists in the database 13 , and has not already been registered by another user.
- the server 12 next queries the database 13 to determine the security management system 14 associated with this particular key (step 26 ). This association is set up on creation of the key (step 20 ).
- a configuration file unique to the user is then dynamically created in the security management system 14 (step 27 ). This is simply a string of command line parameters generated by the security management system 14 , encrypted and then written to a file on the security management system 14 .
- the configuration file is also sent to the user terminal 10 as a text file, where it is saved to the hard disk of the terminal 10 (step 29 ). If the server 12 is the one to which the user terminal 10 is operating, this can be downloaded directly. However, if the user terminal 10 is accessing the configuration program through a website, the website server 12 presents a web page to the user (step 28 ). This page has a link to the configuration file on the security management system 14 , and an instruction requesting the user to use the link to download and save the configuration file on to the hard disk of the computer 10 (step 29 ).
- the configuration file is searched for automatically on each subsequent boot-up of the computer, and is read and decrypted, thereby causing the launch of the set-up program, which is passed the command line parameters from the decrypted configuration file.
Abstract
Operating software is installed in a computer terminal from a data carrier such as a CD ROM. The data carrier has generic software components which automatically access a server, and transmit details of the terminal's operating system to allow the server to download information for installation of the operating software specific to the terminal's operating system. This allows reconfiguration to be carried out automatically to accommodate a new capability, with minimal input from the user.
Description
- This invention relates to the installation of operating software to personal computers and other consumer equipment, such as the software required for the computer to operate with newly installed hardware. Such hardware is typically embodied as a set of electronic components and the necessary connections for fitting to a computer, either to provide a new capability or to upgrade an existing one. In order for the computer to operate correctly with the new hardware installed, a reconfiguration procedure has to be carried out to ensure that the computer recognises the presence and purpose of the new hardware. Similar reconfiguration may be necessary if the computer is to be connected through a new communications system, or to carry out new processes in co-operation with other remote apparatus. These re-configurations do not necessarily involve the installation of new hardware.
- The reconfiguration can be an intensive process requiring a considerable amount of technical knowledge by the user, and the details of the process vary from one machine to another depending both on its original design and any previous reconfigurations which may have been made. Information may also be required about various network servers to which the computer is connected in order to correctly configure the computer. It is therefore difficult for a supplier to provide simple instructions suitable for a lay person to perform the process. Some systems provide step-by-step instructions for the user to perform as the installation proceeds, but nevertheless require the user to provide input of several pieces of information he may not readily have to hand.
- The present invention allows the process to be automated, requiring only a single “run” instruction from the user. It also ensures that when a user subsequently uses the downloaded software, the user is an authorised user of that software and is not using an unauthorised copy. The invention will be described, for illustrative purposes, in relation to an embodiment for the configuration of a computer to communicate over a suitable telecommunications system using an Internet Security Protocol (IPSec) client, or over a Wireless LAN (local area network). However, other applications of the invention can be envisaged and the embodiment is not to be taken as limitative.
- According to the invention there is provided a method of installing operating software in a computer terminal in which generic software components are installed for:
- automatically accessing a server,
- transmitting details of the terminal's operating system to the server,
- downloading specific information for installation of the operating software from the server according to the terminal's operating system,
- verifying a user identity carried in the operating software,
- and obtaining a certification code from the server for authentication of the terminal during any future communication.
- This certification code prevents the use of unauthorised copies of the downloaded software since such copies, downloaded from an authorised terminal, would not obtain a correct code from the server.
- The generic software may perform any desrired function. In the described embodiment it comprises communications interface software. The server may be arranged to allow access to the installation software only from specified users, for example by use of a firewall system or a password control system. The password may be a product key associated with a data carrier carrying the generic software components, the server permitting only a limited number of accessions (typically just one) by users using any one product key.
- The invention also extends to a data carrier for carrying the generic software components used in this method. Although in the described embodiment it takes the form of a CD-ROM, the computer program product may be embodied on any suitable carrier readable by a suitable computer input device, and may take the form of optically readable marks, magnetic media, punched card or tape, or an electromagnetic (radio frequency or optical) or ultrasonic signal. The carrier may carry programming for several services, accessible by different users or user groups.
- The invention also extends to a general-purpose computer programmed to operate as a server and having means for receiving details of a terminal's operating system, means for generating specific information according to the terminal's operating system for installation of operating software on the terminal's operating system, a database for storing user identities, means for generating a certification code for transmission to a terminal during the installation process, and means for verification of a terminal identity transmitted to the computer by a terminal's operating system. Preferably it has means for identifying, by interrogation of a terminal, the specific configuration of that terminal and for providing the installation software necessary for that configuration. It may also have access control means to allow access to the installation software only from specified users.
- The server may be a privately operated server, for example run by a business for use by its employees, using a “firewall” system to allow access only from those employees' terminals. Alternatively it may be an external website, with controls in place such as password control to control access to the installation software. The installation software can be available to anyone granted access rights—the program provider may grant access rights through one or more corporate internets (“intranets”), or to individuals. In either case the server has means for identifying, by interrogation of the client computer, the specific configuration of the client computer and provide the necessary installation software. This removes the need for the human user to provide any input.
- Preferably the generic software comprises communications interface software such as client software and Wireless LAN drivers
- The verification of a user identity carried in the operating software ensures that the carrier on which the program is carried (typically a CD-ROM having a unique identity code) has not been previously used by another user and therefore has not been cloned, and verifies the user as legitimate.
- The invention may be embodied in any suitable computer language, and capable of operation with any operating system supported by standard computers.
- The invention allows a single-click process, requiring no configuration input from the user, to be used to automatically install and configure systems such as WLAN drivers and security technology. No other information is required from the user as a web-site hosted by the security body provides the specific configuration information required for the user's needs. This web-site is accessed automatically as part of the process. No network specific inputs are required from the user, therefore the data carrier carrying the programming that initiates the process can be generic for multiple, different deployments.
- A validation database may be provided to enable the organisation providing the service to restrict the user base. In advance the company can determine exactly who can access the service—for example a wireless local area network (WLAN)—and can easily amend or revoke privileges. Installation data carriers, typically CD-ROMs can be provided from any location without need for training, and specifics of installation are performed via a web-site configured for the company.
- An illustrative embodiment of the invention will now be discussed, by way of example, with reference to the FIGURE, which is a schematic representation of the various elements which co-operate to perform the invention (indicated by reference numerals beginning with a “1”), incorporating representations of information transfers illustrating the operation of the invention (indicated by reference numerals beginning with a “2”).
- The FIGURE shows a
personal computer 10 connected by way of anetwork 11 to aserver 12 having access to avalidation database 13, and asecurity management system 14. Adata carrier 15, such as a compact disc read-only memory (CDROM), is used to carry the required programming. The CDROM is used in this embodiment purely for illustrative purposes; thecarrier 15 may take any suitable form, such as a signal carried over a suitable transmission medium such as thenetwork 11. - The
user terminal 10 is a user's laptop or desktop computer. The client software and wireless hardware are installed onto this device allowing the user to communicate securely over thewireless link 11. - The server may be a privately operated server serving a limited number of user terminals (10 etc) to which the installation software must first be supplied when the operator of the server wishes its client servers to have the software installed. Alternatively the
server 12 may be accessed as a website operated by the creator of the software and having the installation software made available to any authorised user. - The
server 12 is used during the install process to ascertain the user's operating system requirements and then downloads the specific configuration information according to the user's needs. This downloaded information is then used to complete the install process. - The
validation database 13 allows the provider of the service to specify the identities of users who are entitled to use the service enabled by the program on thedata carrier 10. The carrier may carry programming for several services, accessible by different users or user groups. - The
server 12 is also used to access thevalidation database 13 to allow users to register a product key code (provided with the installation CDROM) to download an encrypted Secure Internet Protocol Configuration file. This configuration file is decrypted by a set-up program, and the parameters are used to launch the Secure Internet Protocol set-up program. - The Security Management System14 provides network security and administration, issues certificates as a public key encrypted document to each authorised user who installs the system.
- When users subsequently access the system, these certificates can be used to verify the authenticity of the user. A list of every client is stored on the
Security management system 14, giving such information as the time and date that the secure certificate was issued, and the last time the certificate was revised or renewed. - The operation of this embodiment of the invention will now be described in detail. There are some differences in operation depending on whether the
server 12 has the software already loaded. - If the
server 12 does not already have the software the operator of the server first has to receive from the supplier a server application program, for example on a CD-ROM, for installation on theserver 12. It also receives a batch of Client CDs, for distibution to its employees or other users who are to use the installation service. With this batch is provided a list of product key codes stored in encrypted format. This list can be supplied in any suitable form, preferably electronic, such as e-mail or floppy disc. - When the operator of the
server 12 installs the server software the application requests this list of product keys. It will use these keys when verifying a client installation request. - If the installation software is already available, through a website, valid product keys are entered on the
database 13 when client CDs having the same product key codes are distributed. - The product key code is printed on the packaging of each client CDROM, or in other accompanying literature, each corresponding to one of the codes entered in the validation database13 (step 20). When a user receives the
installation CDROM 15, he installs the CDROM on hisuser terminal 10. The installation program on the CDROM causes the terminal 10 to access theappropriate server 12, either directly if connected by a local area network, or otherwise via a suitable website, to attempt registration (step 21). - The
server 12 initiates a user interface dialog and returns a request for the product key code which the user then supplies (step 22). - From this point the process is automatic—the human user has no further input to make.
- The set up process runs on the
user terminal 10 as follows. - The user terminal first accesses the server12 (step 22) for the configuration file previously installed there. This configuration process first verifies the product key previously entered by the user. If this is validated the
server 12 sends the configuration file to theclient terminal 10. Firstly, if required, the Wireless LAN card driver is installed (step 23). This will cause the computer to reboot its operating system (e.g. Microsoft Windows™ NT or 2000) so that operating system will recognise the new driver, but the installation process may continue automatically whilst this is going on. - In the next step the installation program accesses the server12 (step 24), which queries the database 13 (step 25) to ensure that the user is permitted to use the system. The checks carried out may include identification of the terminal 10 itself, or of the
telecommunications line 11 by which the terminal 10 accessed the system. Theserver 12 also verifies that the product key that was entered exists in thedatabase 13, and has not already been registered by another user. - If any of the above tests fail, an error message is displayed. Otherwise, if the product key is valid and has not previously been registered, the
server 12 proceeds to the next stage. - The
server 12 next queries thedatabase 13 to determine thesecurity management system 14 associated with this particular key (step 26). This association is set up on creation of the key (step 20). - A configuration file unique to the user is then dynamically created in the security management system14 (step 27). This is simply a string of command line parameters generated by the
security management system 14, encrypted and then written to a file on thesecurity management system 14. - The configuration file is also sent to the
user terminal 10 as a text file, where it is saved to the hard disk of the terminal 10 (step 29). If theserver 12 is the one to which theuser terminal 10 is operating, this can be downloaded directly. However, if theuser terminal 10 is accessing the configuration program through a website, thewebsite server 12 presents a web page to the user (step 28). This page has a link to the configuration file on thesecurity management system 14, and an instruction requesting the user to use the link to download and save the configuration file on to the hard disk of the computer 10 (step 29). - Once saved on the hard disk, the configuration file is searched for automatically on each subsequent boot-up of the computer, and is read and decrypted, thereby causing the launch of the set-up program, which is passed the command line parameters from the decrypted configuration file.
Claims (15)
1. A method of installing operating software in a computer terminal in which generic software components are installed for:
automatically accessing a server, transmitting details of the terminal's operating system to the server, downloading specific information for installation of the operating software
from the server according to the terminal's operating system, verifying a user identity carried in the operating software,
and obtaining a certification code from the server for authentication of the terminal during any future communication.
2. A method according to claim 1 , wherein the generic software comprises communications interface software.
3. A method according to claim 1 , wherein the server allows access to the installation software only from specified users.
4. A method according to claim 3 , wherein the server comprises a firewall system.
5. A method according to claim 3 , wherein access to the server is enabled by transmission of a password.
6. A method according to claim 5 , wherein the password is a product key associated with a data carrier carrying the generic software components.
7. A method according to claim 6 , wherein the server permits only a limited number of accessions by users using any one product key.
8. A data carrier carrying generic software components for use in the method of claim 1 .
9. A data carrier according to claim 8 , carrying programming for several services, accessible by different users or user groups.
10. A data carrier according to claim 8 , comprising a recording medium carrying data for reading by a reading device associated with the terminal on which the software is to be installed.
11. A general-purpose computer programmed to operate as a server and having means for receiving details of a terminal's operating system, means for generating specific information according to the terminal's operating system for installation of operating software on the terminal's operating system, a database for storing user identities, means for generating a certification code for transmission to a terminal during the installation process, and means for verification of a terminal identity transmitted to the computer by a terminal's operating system.
12. A computer according to claim 11 having means for identifying, by interrogation of a terminal, the specific configuration of the terminal and means for providing the installation software necessary for that configuration.
13. A computer according to claim 11 , comprising access control means to allow access to the installation software only from specified users.
14. A computer according to claim 13 , wherein the access control means comprises a firewall system having means for allowing access only by specified terminals or communications lines.
15. A computer according to claim 13 , wherein the access control means comprises a password system.
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP01305714 | 2001-07-02 | ||
EP01305714.6 | 2001-07-02 | ||
GB0117053.9 | 2001-07-12 | ||
GB0117053A GB0117053D0 (en) | 2001-07-12 | 2001-07-12 | Program installation process |
PCT/GB2002/003047 WO2003005144A2 (en) | 2001-07-02 | 2002-07-01 | Program installation process |
Publications (1)
Publication Number | Publication Date |
---|---|
US20040194083A1 true US20040194083A1 (en) | 2004-09-30 |
Family
ID=26077151
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/481,590 Abandoned US20040194083A1 (en) | 2001-07-02 | 2002-07-01 | Program installation process |
Country Status (4)
Country | Link |
---|---|
US (1) | US20040194083A1 (en) |
EP (1) | EP1419438A2 (en) |
CA (1) | CA2448932A1 (en) |
WO (1) | WO2003005144A2 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060004697A1 (en) * | 2004-06-09 | 2006-01-05 | Lipsky Scott E | Method and system for restricting the display of images |
US20060143601A1 (en) * | 2004-12-28 | 2006-06-29 | International Business Machines Corporation | Runtime optimizing applications for a target system from within a deployment server |
US20060156273A1 (en) * | 2005-01-12 | 2006-07-13 | Microsoft Corporation | Smart scheduler |
US20070169064A1 (en) * | 2005-08-16 | 2007-07-19 | Shiro Hagihara | Information processing apparatus, and information processing method and program |
US20080189549A1 (en) * | 2007-02-01 | 2008-08-07 | Microsoft Corporation | Secure serial number |
US20100115253A1 (en) * | 2004-06-15 | 2010-05-06 | Lipsky Scott E | Method and system for securely distributing content |
US8683579B2 (en) | 2010-12-14 | 2014-03-25 | Microsoft Corporation | Software activation using digital licenses |
US8775797B2 (en) | 2010-11-19 | 2014-07-08 | Microsoft Corporation | Reliable software product validation and activation with redundant security |
US8984293B2 (en) | 2010-11-19 | 2015-03-17 | Microsoft Corporation | Secure software product identifier for product validation and activation |
US20170301226A1 (en) * | 2016-04-15 | 2017-10-19 | Honeywell International Inc. | Fire detector test device and methods therefor |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160342406A1 (en) * | 2014-01-06 | 2016-11-24 | Johnson Controls Technology Company | Presenting and interacting with audio-visual content in a vehicle |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US6009274A (en) * | 1996-12-13 | 1999-12-28 | 3Com Corporation | Method and apparatus for automatically updating software components on end systems over a network |
US6094723A (en) * | 1996-05-10 | 2000-07-25 | Sony Corporation | Copy protection system for recording media |
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
US6151643A (en) * | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6167567A (en) * | 1998-05-05 | 2000-12-26 | 3Com Corporation | Technique for automatically updating software stored on a client computer in a networked client-server environment |
US20020091644A1 (en) * | 2001-01-05 | 2002-07-11 | Microsoft Corporation | Electronic software license with software product installer identifier |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU776222B2 (en) * | 1998-11-16 | 2004-09-02 | Angel Secure Networks, Inc. | System and method for installing an auditable secure network |
EP1096374A2 (en) * | 1999-11-01 | 2001-05-02 | Citicorp Development Center, Inc. | Method and system for simultancous and unattended installation of software on a self-service financial transaction terminal |
-
2002
- 2002-07-01 EP EP02743408A patent/EP1419438A2/en not_active Withdrawn
- 2002-07-01 US US10/481,590 patent/US20040194083A1/en not_active Abandoned
- 2002-07-01 WO PCT/GB2002/003047 patent/WO2003005144A2/en active Application Filing
- 2002-07-01 CA CA002448932A patent/CA2448932A1/en not_active Abandoned
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5826014A (en) * | 1996-02-06 | 1998-10-20 | Network Engineering Software | Firewall system for protecting network elements connected to a public network |
US6094723A (en) * | 1996-05-10 | 2000-07-25 | Sony Corporation | Copy protection system for recording media |
US6151643A (en) * | 1996-06-07 | 2000-11-21 | Networks Associates, Inc. | Automatic updating of diverse software products on multiple client computer systems by downloading scanning application to client computer and generating software list on client computer |
US6009274A (en) * | 1996-12-13 | 1999-12-28 | 3Com Corporation | Method and apparatus for automatically updating software components on end systems over a network |
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
US6167567A (en) * | 1998-05-05 | 2000-12-26 | 3Com Corporation | Technique for automatically updating software stored on a client computer in a networked client-server environment |
US20020091644A1 (en) * | 2001-01-05 | 2002-07-11 | Microsoft Corporation | Electronic software license with software product installer identifier |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060004697A1 (en) * | 2004-06-09 | 2006-01-05 | Lipsky Scott E | Method and system for restricting the display of images |
US8260710B2 (en) * | 2004-06-15 | 2012-09-04 | Eqapez Foundation, L.L.C. | Method and system for securely distributing content |
US20100115253A1 (en) * | 2004-06-15 | 2010-05-06 | Lipsky Scott E | Method and system for securely distributing content |
US20060143601A1 (en) * | 2004-12-28 | 2006-06-29 | International Business Machines Corporation | Runtime optimizing applications for a target system from within a deployment server |
US9535679B2 (en) * | 2004-12-28 | 2017-01-03 | International Business Machines Corporation | Dynamically optimizing applications within a deployment server |
US7934215B2 (en) * | 2005-01-12 | 2011-04-26 | Microsoft Corporation | Smart scheduler |
US20110167426A1 (en) * | 2005-01-12 | 2011-07-07 | Microsoft Corporation | Smart scheduler |
US8387051B2 (en) | 2005-01-12 | 2013-02-26 | Microsoft Corporation | Smart scheduler |
US20060156273A1 (en) * | 2005-01-12 | 2006-07-13 | Microsoft Corporation | Smart scheduler |
US20070169064A1 (en) * | 2005-08-16 | 2007-07-19 | Shiro Hagihara | Information processing apparatus, and information processing method and program |
US8924953B2 (en) * | 2005-08-16 | 2014-12-30 | Sony Corporation | Information processing apparatus, and information processing method and program |
US20110296532A1 (en) * | 2007-02-01 | 2011-12-01 | Microsoft Corporation | Secure serial number |
US20080189549A1 (en) * | 2007-02-01 | 2008-08-07 | Microsoft Corporation | Secure serial number |
US8001383B2 (en) * | 2007-02-01 | 2011-08-16 | Microsoft Corporation | Secure serial number |
US8732844B2 (en) * | 2007-02-01 | 2014-05-20 | Microsoft Corporation | Secure serial number |
US9292665B2 (en) | 2007-02-01 | 2016-03-22 | Microsoft Technology Licensing, Llc | Secure serial number |
US8775797B2 (en) | 2010-11-19 | 2014-07-08 | Microsoft Corporation | Reliable software product validation and activation with redundant security |
US8984293B2 (en) | 2010-11-19 | 2015-03-17 | Microsoft Corporation | Secure software product identifier for product validation and activation |
US8683579B2 (en) | 2010-12-14 | 2014-03-25 | Microsoft Corporation | Software activation using digital licenses |
US20170301226A1 (en) * | 2016-04-15 | 2017-10-19 | Honeywell International Inc. | Fire detector test device and methods therefor |
US9922542B2 (en) * | 2016-04-15 | 2018-03-20 | Honeywell International Inc. | Fire detector test device and methods therefor |
Also Published As
Publication number | Publication date |
---|---|
CA2448932A1 (en) | 2003-01-16 |
WO2003005144A3 (en) | 2004-03-04 |
WO2003005144A2 (en) | 2003-01-16 |
EP1419438A2 (en) | 2004-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2482221B1 (en) | Secure software updates | |
US9906534B2 (en) | Remote access to resources over a network | |
US11237817B2 (en) | Operating system update management for enrolled devices | |
US7540024B2 (en) | Security features for portable computing environment | |
US7532882B2 (en) | Method and system for automatically configuring access control | |
JP4838610B2 (en) | Document management apparatus, document management method, and program | |
US20030070089A1 (en) | Method and apparatus to facilitate cross-domain push deployment of software in an enterprise environment | |
US20070204166A1 (en) | Trusted host platform | |
JPH1091427A (en) | Method and system for guaranteeing safety in using contents with signature | |
US20070094400A1 (en) | Software installation within a federation | |
US8850563B2 (en) | Portable computer accounts | |
US20040194083A1 (en) | Program installation process | |
US6418486B1 (en) | Device handling system and method | |
US20170149788A1 (en) | Information processing apparatus, terminal apparatus, program, and information processing system | |
US8127033B1 (en) | Method and apparatus for accessing local computer system resources from a browser | |
AU2005222507A1 (en) | Portable computing environment | |
CN101547202A (en) | Method for processing security level of device on the net | |
JPH10320357A (en) | Certification server in user certification system, method for certifying the same and recording medium for the method | |
JP2003091420A (en) | Program for update, device program and program update supporting method | |
EP1505795B1 (en) | Network device and method for use under non-security mode | |
JP2002140301A (en) | Cooperative security system between systems | |
Team | SAMBA Project Documentation | |
AU2011202785B2 (en) | Secure software updates | |
JP2005148952A (en) | Information processor, method for controlling it, and program | |
CN115801342A (en) | Application operation method and system based on OAuth2 protocol and private equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: BRITISH TELECOMMUNICATIONS PUBLIC LIMITED COMPANY, Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:HINDLE, IAN;PORTER, MARCUS;REEL/FRAME:015433/0954 Effective date: 20020821 |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |